A copyright protection scheme for digital images using visual cryptography technique Der-Chyuan Lou, Hao-Kuan Tso and Jiang-Lung Liu The Computer Standards.

Slides:



Advertisements
Similar presentations
國立暨南國際大學 National Chi Nan University A Study of (k, n)-threshold Secret Image Sharing Schemes in Visual Cryptography without Expansion Presenter : Ying-Yu.
Advertisements

IEEE TRANSACTIONS ON IMAGE PROCESSING,2007 指導老師:李南逸 報告者:黃資真 Cheating Prevention in Visual Cryptography 1.
LOGO Region of Interest Fragile Watermarking for Image Authentication 指導老師:陳炳彰老師 學生:林青照.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
專題研討 --- 心得報告 Face Recognition System with Genetic Algorithm and ANT Colony Optimization International Journal of Innovation, Management and Technology,
Maximizing Strength of Digital Watermarks Using Neural Network Presented by Bin-Cheng Tzeng 5/ Kenneth J.Davis; Kayvan Najarian International Conference.
Real-time Human Motion Analysis by Image Skeletonization 指導教授:張元翔 老師 學生: 吳思穎.
Fifth International Conference on Information
1 Audio Watermarking for Copyright Protection 報告人:鄒昇龍.
Secret Image Sharing Presented by Du-Shiau Tsai. 2 Introduction Secret image sharing (Tsai)
Enhanced images watermarking based on amplitude modulation Image and Vision Computing, 24 (2006), 111 – 119 Authors :T. Amornraksa, K. Janthawongwilai.
Watermarking Technology Ishani Vyas CS590 Winter 2008.
Implementing a reliable neuro-classifier
A Novel Scheme for Hybrid Digital Video Watermarking By Pat P. W. Chan Supervised by Michael R. Lyu 2/2/2004 Computer Science and Engineering Department.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
Wavelet-based Image Fusion by Sitaram Bhagavathy Department of Electrical and Computer Engineering University of California, Santa Barbara Source: “Multisensor.
Bit-level based secret sharing for image encryption Rastislav Lukac, Konstantinos N. Plataniotis Presented by Du-Shiau Tsai Pattern Recognition 38 (2005)
Digital Image Stabilization (DIS) 指導教授 : 楊士萱 老師 學生 : 鄭馥銘.
-Artificial Neural Network- Chapter 3 Perceptron 朝陽科技大學 資訊管理系 李麗華教授.
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
A 12-bit, 300 MS CMOS DAC for high-speed system applications
Zhejiang University Wavelet-based 3D mesh model watermarking Shi Jiao-Ying State Key Laboratory of CAD&CG, Zhejiang University, Hangzhou
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
All rights reserved. Copyright (c) 1999, Hitachi, Ltd. Slide 1 Internet/Marks Hitachi, Ltd ,16 - Visual Marks for Cyber World -
Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.
Damageless Information Hiding Technique using Neural Network Keio University Graduate School of Media and Governance Kensuke Naoe.
Reversible medical image watermarking based on wavelet histogram shifting Source: Authors: Reporter: Date: The Imaging Science Journal, Vol. 59, No. 1,
WATERMARKING Adviser :葉家宏 老師 Presenter :邱怡雯 Date : 2011/03/28.
A study for Relational Database watermarking scheme Speaker: Pei-Feng Shiu Date: 2012/09/21.
1 A Novel Approach to Extract Colon Lumen from CT Images for Virtual Colonoscopy 作者 :  Dongqing Chen,Zhengrong Liang, Mark R.Wax, Lihong Li 出處 :  IEEE,Transaction.
Monte Carlo Simulation of Photon Migration 報告者:郭雅涵 指導教授:蘇文鈺老師
Reversible hiding in DCT-based compressed images Authors:Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai Adviser: Jui-Che Teng Speaker:
Mixed Reality: A Model of Mixed Interaction Céline Coutrix, Laurence Nigay User Interface Engineering Team CLIPS-IMAG Laboratory, University of Grenoble.
A new provably secure certificateless short signature scheme Authors: K.Y. Choi, J.H. Park, D.H. Lee Source: Comput. Math. Appl. (IF:1.472) Vol. 61, 2011,
A Simple Transmit Diversity Technique for Wireless Communications 指導老師 : 黃文傑 博士 學生 : 吳濟廷
BACKGROUND MODEL CONSTRUCTION AND MAINTENANCE IN A VIDEO SURVEILLANCE SYSTEM Computer Vision Laboratory 指導教授:張元翔 老師 研究生:許木坪.
1 Robust and transparent watermarking scheme for colour images Speaker : Po-Hung Lai Adviser : Chih-Hung Lin Date :
VCPSS : A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches Sian-Jheng.
Multi resolution Watermarking For Digital Images Presented by: Mohammed Alnatheer Kareem Ammar Instructor: Dr. Donald Adjeroh CS591K Multimedia Systems.
南台科技大學 資訊工程系 Data hiding based on the similarity between neighboring pixels with reversibility Author:Y.-C. Li, C.-M. Yeh, C.-C. Chang. Date:
南台科技大學 資訊工程系 An effective solution for trademark image retrieval by combining shape description and feature matching 指導教授:李育強 報告者 :楊智雁 日期 : 2010/08/27.
Authors: Tzung-Her Chen, Kai-Hsiang Tsao, and Kuo-Chen Wei Source: Proceedings of The 8th International Conference on Intelligent System Design and Applications.
 劉庭瑋 Electronic Medical Report Security Using Visual Secret Sharing Scheme.
Impossibility proofs for RSA signatures in the standard model Pascal Paillier Topics in Cryptology – CT-RSA 2007.
人力資源報告 Image and Signal Processing 1 Steganography Using Sudoku Revisited Wien Hong, Tung-Shou Chen, Chih-Wei Shiu Department of Information Management,
1 Security of fragile watermarking scheme for image authentication Authors: K. C. Liao, W. B. Lee, and C. W. Liao Source: The Imaging Science Journal,
Der-Chyuan Lou and Jiang-Lung Liu,
Image Watermarking Chu, Hsi-Cheng.
The Report of Monographic Study
Chair Professor Chin-Chen Chang Feng Chia University
Source: Signal Processing 109 (2015) 317–333
Hefei Electronic Engineering Institute, Hefei , China
A Study of Digital Image Coding and Retrieving Techniques
Source : Signal Processing Image Communication Vol. 66, pp , Aug 2018
Source: IEEE Access, Vol. 6, Dec. 2017, pp
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Zhe-Ming Lu, Chun-He Liu, Dian-Guo Xu, Sheng-He Sun,
A new chaotic algorithm for image encryption
Digital Watermarking for Image Authentication with Localization
Data hiding method using image interpolation
A Semi-blind Watermarking Based on Discrete Wavelet Transform
Hiding Multiple Watermarks in Transparencies of Visual Cryptography
Novel Multiple Spatial Watermarking Technique in Color Images
An Algorithm for Removable Visible Watermarking
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
A Robust Digital Watermarking Of Satellite Image at Third Level DWT Decomposition Source:International Conference on Computational Intelligence and Multimedia.
An imperceptible spatial domain color image watermarking scheme
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
A Quadratic-Residue-based Fragile Watermarking Scheme
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

A copyright protection scheme for digital images using visual cryptography technique Der-Chyuan Lou, Hao-Kuan Tso and Jiang-Lung Liu The Computer Standards & Interfaces Volume: 29, 2006 指導老師:李南逸 Speaker :黃資真

Outline Introduction Visual cryptography Secret image generation Watermark extraction Conclusions

Introduction Visual cryptography technique Extract the feature from the protected image Generate a secret image

Visual cryptography

Secret image generation (1/3) IA protected image W’’A watermark KA secret key CA codebook LLow sub-band MMiddle sub-band nNormal-distribution random bit-sequence fFeature value SA secret image

Secret image generation (2/3) Input : I, W, K, C Output : S  Step 1 :  Step 2 : Extract L and M.  Step 3 : n = bit-sequence generated by K Three-level DWT I

Secret image generation (3/3)  Step 4 :  Step 5 : If f(i,j) = 1 and mod(i+j,4) = 0 If W(i,j) = 0 S(m,n) = [1 0] Else S(m,n) = [0 1] End  Step 6 : Register to CA for the secret image

Watermark extraction(1/4) I’A suspected image SSecret image KA secret key CCodebook nNormal-distribution random bit-sequence W’’A watermark L’Low sub-band M’Middle sub-band f’Extract the feature value PPublic image

Watermark extraction(2/4) Input : I’, S, K, C Output : W’’  Step 1 :  Step 2 : Extract L’ and M’  Step 3 : n = generated by K Three-level DWT I’

Watermark extraction(3/4)  Step 4 :  Step 5 : If f ’(i,j) = 1 and mod(i+j,4) = 0 P(m,n) = [1 0] End

Watermark extraction(4/4)  Step 6 :  Step 7 :

Conclusions A secret image is generated by utilizing the codebook of visual cryptography. The secret image is registered to CA for further protection. Watermark can be extracted by performing the XOR operation between the secret image and the public image.